linux-arch.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2017-10-27 10:52:08 to 2017-11-06 09:00:02 UTC [more...]

[PATCH v9 00/51] powerpc, mm: Memory Protection Keys
 2017-11-06  8:57 UTC  (89+ messages)
` [PATCH v9 01/51] mm, powerpc, x86: define VM_PKEY_BITx bits if CONFIG_ARCH_HAS_PKEYS is enabled
` [PATCH v9 02/51] mm, powerpc, x86: introduce an additional vma bit for powerpc pkey
` [PATCH v9 03/51] powerpc: initial pkey plumbing
` [PATCH v9 04/51] powerpc: track allocation status of all pkeys
` [PATCH v9 05/51] powerpc: helper function to read,write AMR,IAMR,UAMOR registers
` [PATCH v9 06/51] powerpc: helper functions to initialize AMR, IAMR and UAMOR registers
` [PATCH v9 07/51] powerpc: cleanup AMR, IAMR when a key is allocated or freed
` [PATCH v9 08/51] powerpc: implementation for arch_set_user_pkey_access()
` [PATCH v9 09/51] powerpc: ability to create execute-disabled pkeys
` [PATCH v9 10/51] powerpc: store and restore the pkey state across context switches
` [PATCH v9 11/51] powerpc: introduce execute-only pkey
` [PATCH v9 12/51] powerpc: ability to associate pkey to a vma
` [PATCH v9 13/51] powerpc: implementation for arch_override_mprotect_pkey()
` [PATCH v9 14/51] powerpc: map vma key-protection bits to pte key bits
` [PATCH v9 15/51] powerpc: Program HPTE key protection bits
` [PATCH v9 16/51] powerpc: helper to validate key-access permissions of a pte
` [PATCH v9 17/51] powerpc: check key protection for user page access
` [PATCH v9 18/51] powerpc: implementation for arch_vma_access_permitted()
` [PATCH v9 19/51] powerpc: Handle exceptions caused by pkey violation
` [PATCH v9 20/51] powerpc: introduce get_mm_addr_key() helper
` [PATCH v9 21/51] powerpc: Deliver SEGV signal on pkey violation
` [PATCH v9 22/51] powerpc/ptrace: Add memory protection key regset
` [PATCH v9 23/51] powerpc: Enable pkey subsystem
` [PATCH v9 24/51] powerpc: sys_pkey_alloc() and sys_pkey_free() system calls
` [PATCH v9 25/51] powerpc: sys_pkey_mprotect() system call
` [PATCH v9 26/51] powerpc: add sys_pkey_modify() "
` [PATCH v9 27/51] mm, x86 : introduce arch_pkeys_enabled()
` [PATCH v9 28/51] mm: display pkey in smaps if arch_pkeys_enabled() is true
` [PATCH v9 29/51] mm/mprotect, powerpc/mm/pkeys, x86/mm/pkeys: Add sysfs interface
` [PATCH v9 30/51] Documentation/x86: Move protecton key documentation to arch neutral directory
` [PATCH v9 31/51] Documentation/vm: PowerPC specific updates to memory protection keys
` [PATCH v9 32/51] selftest/x86: Move protecton key selftest to arch neutral directory
` [PATCH v9 33/51] selftest/vm: rename all references to pkru to a generic name
` [PATCH v9 34/51] selftest/vm: move generic definitions to header file
` [PATCH v9 35/51] selftest/vm: typecast the pkey register
` [PATCH v9 36/51] selftest/vm: generic function to handle shadow key register
` [PATCH v9 37/51] selftest/vm: fix the wrong assert in pkey_disable_set()
` [PATCH v9 38/51] selftest/vm: fixed bugs in pkey_disable_clear()
` [PATCH v9 39/51] selftest/vm: clear the bits in shadow reg when a pkey is freed
` [PATCH v9 40/51] selftest/vm: fix alloc_random_pkey() to make it really random
` [PATCH v9 41/51] selftest/vm: introduce two arch independent abstraction
` [PATCH v9 42/51] selftest/vm: pkey register should match shadow pkey
` [PATCH v9 43/51] selftest/vm: generic cleanup
` [PATCH v9 44/51] selftest/vm: powerpc implementation for generic abstraction
` [PATCH v9 45/51] selftest/vm: fix an assertion in test_pkey_alloc_exhaust()
` [PATCH v9 46/51] selftest/vm: associate key on a mapped page and detect access violation
` [PATCH v9 47/51] selftest/vm: associate key on a mapped page and detect write violation
` [PATCH v9 48/51] selftest/vm: detect write violation on a mapped access-denied-key page
` [PATCH v9 49/51] selftest/vm: sub-page allocator
` [PATCH v9 50/51] selftests/powerpc: Add ptrace tests for Protection Key register
` [PATCH v9 51/51] selftests/powerpc: Add core file test "

[PATCH v10 00/38] x86: Secure Memory Encryption (AMD)
 2017-11-06  7:13 UTC  (8+ messages)
` [PATCH v10 20/38] x86, mpparse: Use memremap to map the mpf and mpc data

MPK: pkey_free and key reuse
 2017-11-05 10:35 UTC  (2+ messages)

[PATCH v5 00/30] ARM Scalable Vector Extension (SVE)
 2017-11-02 19:18 UTC  (62+ messages)
` [PATCH v5 01/30] regset: Add support for dynamically sized regsets
` [PATCH v5 02/30] arm64: fpsimd: Correctly annotate exception helpers called from asm
` [PATCH v5 03/30] arm64: signal: Verify extra data is user-readable in sys_rt_sigreturn
` [PATCH v5 04/30] arm64: KVM: Hide unsupported AArch64 CPU features from guests
` [PATCH v5 05/30] arm64: efi: Add missing Kconfig dependency on KERNEL_MODE_NEON
` [PATCH v5 06/30] arm64: Port deprecated instruction emulation to new sysctl interface
` [PATCH v5 07/30] arm64: fpsimd: Simplify uses of {set,clear}_ti_thread_flag()
` [PATCH v5 08/30] arm64/sve: System register and exception syndrome definitions
` [PATCH v5 09/30] arm64/sve: Low-level SVE architectural state manipulation functions
` [PATCH v5 10/30] arm64/sve: Kconfig update and conditional compilation support
` [PATCH v5 11/30] arm64/sve: Signal frame and context structure definition
` [PATCH v5 12/30] arm64/sve: Low-level CPU setup
` [PATCH v5 13/30] arm64/sve: Core task context handling
` [PATCH v5 14/30] arm64/sve: Support vector length resetting for new processes
` [PATCH v5 15/30] arm64/sve: Signal handling support
` [PATCH v5 16/30] arm64/sve: Backend logic for setting the vector length
` [PATCH v5 17/30] arm64: cpufeature: Move sys_caps_initialised declarations
` [PATCH v5 18/30] arm64/sve: Probe SVE capabilities and usable vector lengths
` [PATCH v5 19/30] arm64/sve: Preserve SVE registers around kernel-mode NEON use
` [PATCH v5 20/30] arm64/sve: Preserve SVE registers around EFI runtime service calls
` [PATCH v5 21/30] arm64/sve: ptrace and ELF coredump support
` [PATCH v5 22/30] arm64/sve: Add prctl controls for userspace vector length management
` [PATCH v5 23/30] arm64/sve: Add sysctl to set the default vector length for new processes
` [PATCH v5 24/30] arm64/sve: KVM: Prevent guests from using SVE
` [PATCH v5 25/30] arm64/sve: KVM: Treat guest SVE use as undefined instruction execution
` [PATCH v5 26/30] arm64/sve: KVM: Hide SVE from CPU features exposed to guests
` [PATCH v5 27/30] arm64/sve: Detect SVE and activate runtime support
` [RFC PATCH v5 29/30] arm64: signal: Report signal frame size to userspace via auxv
` [RFC PATCH v5 30/30] arm64/sve: signal: Include SVE when computing AT_MINSIGSTKSZ
  ` [PATCH v5 28/30] arm64/sve: Add documentation

[PATCH v2] kbuild: clean up *.dtb and *.dtb.S patterns from top-level Makefile
 2017-11-02  9:08 UTC  (6+ messages)

[GIT PULL] signal bug fix for v4.14-rc8
 2017-11-01 22:22 UTC 

[PATCH] [RFC] vm: add a syscall to map a process memory into a pipe
 2017-11-01 17:47 UTC  (5+ messages)

[PATCH v4 00/28] ARM Scalable Vector Extension (SVE)
 2017-10-31 10:57 UTC  (30+ messages)
` [PATCH v4 02/28] arm64: KVM: Hide unsupported AArch64 CPU features from guests
` [PATCH v4 11/28] arm64/sve: Core task context handling
` [PATCH v4 13/28] arm64/sve: Signal handling support
` [PATCH v4 16/28] arm64/sve: Probe SVE capabilities and usable vector lengths
` [PATCH v4 19/28] arm64/sve: ptrace and ELF coredump support
` [PATCH v4 20/28] arm64/sve: Add prctl controls for userspace vector length management
` [PATCH v4 25/28] arm64/sve: Detect SVE and activate runtime support
` [PATCH v4 26/28] arm64/sve: Add documentation
` [RFC PATCH v4 27/28] arm64: signal: Report signal frame size to userspace via auxv
` [RFC PATCH v4 28/28] arm64/sve: signal: Include SVE when computing AT_MINSIGSTKSZ

[PATCH v3.16.y] percpu: make this_cpu_generic_read() atomic w.r.t. interrupts
 2017-10-30 14:40 UTC  (4+ messages)

Urgent Reply Needed
 2017-10-29  8:40 UTC 

[PATCH v3] lib: optimize cpumask_next_and()
 2017-10-28 13:24 UTC  (2+ messages)

[PATCH v10 02/18] x86/boot: Relocate definition of the initial state of CR0
 2017-10-27 20:25 UTC  (2+ messages)

[PATCH v9 02/29] x86/boot: Relocate definition of the initial state of CR0
 2017-10-27 19:02 UTC  (7+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).